Sunday, September 24, 2006

Weekend Reading

Bots Bedevil Data Security Barriers

According to Dave Rand, chief technology officer for Internet content solutions at Trend Micro Inc. in Cupertino, Calif., malware writers compromised 250,000 PCs during a six-day siege on computers in Latin America earlier this month. Now those machines are “bots,” mindless devices controlled by criminals seeking to steal information. If you think it’s just a case of lousy security management among south-of-the-border Internet service providers, think again. Rand points to an ISP in France that has more than a half-million malware-laced bots on its network.

Read more HERE.

==================================================================
WiFi security - or lack thereof (Part 1)

I have recently written about the relative ease by which a wireless network can be penetrated if not properly protected. Tools such as Netstumbler, Airsnort, and others are some of the staples of the WiFi hacker. It is these very same tools that will be used to attack your WiFi networks. These tools can be used with varying degrees of success. The deciding factor of whether or not your network will be cracked largely depends on how up to date your defenses are. There is little point in defending your network with a flyswatter if your attacker is wielding a gun. You must stay up to date with technology for your medium, which will be discussed later on in this article.

Read the article HERE.

==================================================================
Secrets of the digital detectives

How fraud-detection systems combine dozens of clues to spot suspicious patterns in mountains of transactions. THE pleasure of reading a classic detective story comes from the way that the sleuth puts together several clues to arrive at a surprising conclusion. What is enjoyable is not so much finding out who the villain is, but hearing the detectives explain their reasoning. Today, not all detectives are human. At insurance companies, banks and telecoms firms, fraud-detection software is used to comb through millions of transactions, looking for patterns and spotting fraudulent activity far more quickly and accurately than any human could. But like human detectives, these software sleuths follow logical rules and combine disparate pieces of data — and there is something curiously fascinating about the way they work.

Read the entire article HERE.

==================================================================
All Vista versions to ship on single disk

Users will be able to upgrade between versions simply by purchasing a new product key.


Microsoft has confirmed that all versions of Vista will be shipped on a single DVD, in a feature called Windows Anytime Upgrade.

According to a spokesperson for the company, "The idea is to provide customers with the most convenient user experience possible by enabling them to more easily and directly upgrade to a higher edition of Windows Vista from within their current edition".

Users would only be installing the version of the operating system that they had purchased, as the product key would be version-specific. Versions range from Starter to Ultimate editions.

Asked if this system meant upgrades would be cheaper, as production and retail costs for Microsoft will be lowered, the spokesperson said they could not give any details of pricing at the moment.

The spokesperson also denied that Windows Anytime Upgrade would prove an attractive target for hackers, saying Vista was "the most secure version of Windows yet".

[ Haven't I heard that same statement before ? My money is on the other team ]

Source :
ZDNet

0 Comments:

Post a Comment

<< Home